A unified approach to identifying and healing vulnerabilities in x86 machine code

Kirill Kononenko
2012 Proceedings of the 18th annual international conference on Mobile computing and networking - Mobicom '12  
The security of software systems is threatened by a wide range of attack vectors, such as buffer overflows, insecure information flow, and side channels, which can leak private information, e.g., by monitoring a program's execution time. Even if programmers manage to avoid such vulnerabilities in a program's source code or bytecode, new vulnerabilities can arise as compilers generate machine code from those representations. We propose a virtual execution environment for x86 machine code that
more » ... bines information from compositional, static, and dynamic program analysis to identify vulnerabilities and timing channels, and uses code transformations to prevent those from being exploited. To achieve an appropriate level of performance as well as combine analysis results, our approach stores summary information in the form of conditional rules that can be shared among analyses.
doi:10.1145/2348543.2348593 dblp:conf/mobicom/Kononenko12 fatcat:ekd5eyzkl5aorcfzpezgmyjayq